{"title":"Diminishing Perimeter","authors":"J. Tiller","doi":"10.1201/1086.1065898X/45654.14.5.20051101/91007.1","DOIUrl":"https://doi.org/10.1201/1086.1065898X/45654.14.5.20051101/91007.1","url":null,"abstract":"Abstract For years the perimeter has been the focal point of security technology. What was once routers with access control lists designed to block traffic founded on basic characteristics has evolved into a myriad of sophisticated devices inspecting every detail of communications. However, successful attacks are on the rise, with increasing impact on organizations. Although perimeter technology appears to have evolved significantly, it pales in comparison to the advancements in tactics and tools and the cleverness of today's threats. To add to the malaise, companies are seeking to fully leverage the Internet and new application development strategies in an effort to support the comprehensive information-sharing needs of the business.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":"50 1","pages":"2 - 4"},"PeriodicalIF":0.0,"publicationDate":"2005-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73544790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Firewall Considerations for the IT Manager","authors":"P. Henry","doi":"10.1201/1086.1065898X/45654.14.5.20051101/91011.5","DOIUrl":"https://doi.org/10.1201/1086.1065898X/45654.14.5.20051101/91011.5","url":null,"abstract":"Abstract To fully understand and appreciate the current environment one will be working in, it is important to look back a few years to gain some insight into the dynamics of network security and how it has evolved to meet the maturing threats present when connecting any private network to the public Internet.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":"7 1","pages":"29 - 51"},"PeriodicalIF":0.0,"publicationDate":"2005-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88585908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Source Code Implications for Malcode","authors":"Ken Dunham","doi":"10.1201/1086.1065898X/45654.14.5.20051101/91009.3","DOIUrl":"https://doi.org/10.1201/1086.1065898X/45654.14.5.20051101/91009.3","url":null,"abstract":"Abstract The advent of source code availability within the malicious code world has serious implications. The nature and volume of attacks have been changed forever as a result. This article reviews a brief history of source code implications and identifies current trends and implications of source code availability to malicious actors.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":"78 1","pages":"10 - 14"},"PeriodicalIF":0.0,"publicationDate":"2005-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86661817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retention of Corporate E-Documents under Sarbanes—Oxley","authors":"Edward H. Freeman","doi":"10.1201/1086.1065898X/45528.14.4.20050901/90084.2","DOIUrl":"https://doi.org/10.1201/1086.1065898X/45528.14.4.20050901/90084.2","url":null,"abstract":"Abstract In recent years, the press has reported many high-profile corporate frauds, leading in turn to major bankruptcies. Congressional committees have investigated widespread financial misstatements in some of America's most trusted organizations. Employees saw their pension funds and life savings evaporate after unscrupulous executives pocketed the last remaining assets. The fall of Arthur Andersen, Enron, Tyco, Healthsouth, Global Crossing, World- Com, and others have cost investors and taxpayers billions.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":"442 1","pages":"5 - 9"},"PeriodicalIF":0.0,"publicationDate":"2005-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76502088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hiding Tree Structured Data and Queries from Untrusted Data Stores","authors":"Ping-Min Lin, K. Candan","doi":"10.1201/1086.1065898X/45528.14.4.20050901/90085.3","DOIUrl":"https://doi.org/10.1201/1086.1065898X/45528.14.4.20050901/90085.3","url":null,"abstract":"Abstract With the increasing use of Web services, many new challenges concerning data security are becoming critical. Especially in mobile services, where clients are generally thin in terms of computation power and storage space, a remote server can be outsourced for the computation or can act as a data store. Unfortunately, such a data store may not always be trustworthy, and clients with sensitive data and queries may want protection from malicious attacks. This article presents a technique to hide tree-structured data from potentially malicious data stores, while allowing clients to traverse the data to locate an object of interest without leaking information to the data store. The two motivating applications for this approach are hiding (1) tree-like XML data as well as XML queries that are in the form of tree-paths, and (2) tree-structured indexes and queries executed on such data structures. We show that this task is achievable through a one-server protocol that introduces only a limited and adjustable communication overhead. This is especially essential in low-bandwidth (such as wireless) distributed environments. The proposed protocol has desirable communication and concurrency performance, as demonstrated by the experiments we have conducted.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":"93 1","pages":"10 - 26"},"PeriodicalIF":0.0,"publicationDate":"2005-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78280262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing Web Services","authors":"Rami Jaamour","doi":"10.1201/1086.1065898X/45528.14.4.20050901/90087.5","DOIUrl":"https://doi.org/10.1201/1086.1065898X/45528.14.4.20050901/90087.5","url":null,"abstract":"Abstract A Web service is an application that can be described, published, located, and invoked over the Web. A Web service is identified by a URI, whose public interfaces and bindings are defined and described using XML in a WSDL (Web Service Description Language) document. SOAP, a W3C specification, is the most common binding used to communicate messages between the service consumers (loosely known as clients) and the service provider (the server). SOAP determines how message data should be enveloped and formatted along with metadata (headers).","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":"175 1","pages":"36 - 44"},"PeriodicalIF":0.0,"publicationDate":"2005-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77774846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Turning Application Security Inside Out: Security for Service-Oriented Architectures (SOAs)","authors":"Brent A. Carlson, A. Himler","doi":"10.1201/1086.1065898X/45528.14.4.20050901/90086.4","DOIUrl":"https://doi.org/10.1201/1086.1065898X/45528.14.4.20050901/90086.4","url":null,"abstract":"Abstract Service-oriented architectures (SOAs) have become mainstream in the past year due to their ability to provide business agility and flexibility through integration, productivity, and software reuse. The Web services framework enables composite applications that leverage service- oriented architecture (SOA) design practices, creating more cost-effective distributed architectures. As enterprises adopt SOA, they open their systems, enabling greater agility and easier integration.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":"6 1","pages":"27 - 35"},"PeriodicalIF":0.0,"publicationDate":"2005-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87050726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sarbanes—Oxley and Enterprise Security: IT Governance — What It Takes to Get the Job Done","authors":"William C. Brown, Frank Nasuti","doi":"10.1201/1086.1065898X/45654.14.5.20051101/91010.4","DOIUrl":"https://doi.org/10.1201/1086.1065898X/45654.14.5.20051101/91010.4","url":null,"abstract":"Abstract Several sections of the Sarbanes— Oxley Act of 2002 (SOX) directly affect the governance of the information technology (IT) organization, including potential SOX certification by the chief information officer, Section 404 internal control assessments, “rapid and current” disclosures to the public of material changes, and authentic and immutable record retention. The Securities and Exchange Commission (SEC) requires publicly traded companies to comply with the Treadway Commission's Committee of Sponsoring Organizations (COSO) that defines enterprise risk and places security as a critical variable in enterprise risk assessment. Effective IT and security governance are examined in terms of SOX compliance. Motorola IT security governance demonstrates effective structures, processes, and communications; centralized security leaders participate with Motorola's Management Board to create an enabling security organization to sustain long-term change.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":"4 1","pages":"15 - 28"},"PeriodicalIF":0.0,"publicationDate":"2005-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87166079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Got Spam?","authors":"Jim S. Tiller","doi":"10.1201/1086.1065898X/45390.14.3.20050701/89144.1","DOIUrl":"https://doi.org/10.1201/1086.1065898X/45390.14.3.20050701/89144.1","url":null,"abstract":"Abstract According to Symantec's March 2005 threat report, spam, usually defined as junk or unsolicited e-mail, made up over 60 percent of all e-mail traffic during the reporting period from July to December 2004. By anyone's definition, that is a lot of junk e-mail. But, as security professionals know, spam is much more than an annoyance and can adversely affect system and data integrity. Moreover, its existence can be an indicator of a much larger issue.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":"30 1","pages":"2 - 4"},"PeriodicalIF":0.0,"publicationDate":"2005-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87541132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing Small Business Computer Networks: An Examination of Primary Security Threats and Their Solutions","authors":"G. Gercek, Naveed Saleem","doi":"10.1201/1086.1065898X/45390.14.3.20050701/89148.5","DOIUrl":"https://doi.org/10.1201/1086.1065898X/45390.14.3.20050701/89148.5","url":null,"abstract":"Abstract This article addresses the primary threats to computer networks that a small business might encounter and also provides strategies to counter these threats. It emphasizes the key characteristics associated with each category of security threat and provides approaches to eliminate or alleviate these threats. The article also presents a case study of a small insurance company for which the authors helped design, implement and secure computer networks. This case study further clarifies the concepts and strategies presented in the paper.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":"115 3 1","pages":"18 - 28"},"PeriodicalIF":0.0,"publicationDate":"2005-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73169506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}